0% found this document useful (0 votes)
144 views26 pages

Information Systems Auditing Overview

This document provides an overview of Module H - Information Systems Auditing. It discusses key topics like general and application controls, auditing around vs through the computer, techniques for testing controls, end-user computing issues, computer fraud prevention, and the roles and responsibilities in IT environments. Control objectives for information and related technology (COBIT) and the systems development life cycle (SDLC) are also covered as frameworks for managing IT controls.

Uploaded by

Yvonne Totesora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views26 pages

Information Systems Auditing Overview

This document provides an overview of Module H - Information Systems Auditing. It discusses key topics like general and application controls, auditing around vs through the computer, techniques for testing controls, end-user computing issues, computer fraud prevention, and the roles and responsibilities in IT environments. Control objectives for information and related technology (COBIT) and the systems development life cycle (SDLC) are also covered as frameworks for managing IT controls.

Uploaded by

Yvonne Totesora
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

Module H - Information Systems Auditing

MODULE H
Information Systems Auditing
LEARNING OBJECI!ES
Review
Checkpoints
Eercises! "ro#lems
and Simulations
$% &ist and descri#e the general and application controls
in a computeri'ed information system%
$! (! )! *! +! ,! -! .!
/! $0! $$! $(! $)
+(! +)! +*! ++! +-! +.! +/!
,0! ,$! ,(! ,,
(% Eplain the difference #etween auditing around the
computer and auditing through the computer%
$*! $+! $, +$! ,+
)% &ist several techni1ues auditors can use to perform
tests of controls in a computeri'ed information
system%
$-! $.! $/! (0! ($ ,*
*% 2escri#e the characteristics and control issues
associated with end-user and other computing
environments%
((! ()! (*! (+ ,)
+% 2efine and descri#e computer fraud and the controls
that an entity can use to prevent it%
(,! (-! (.! (/! )0 +,
M32H-$
Module H - Information Systems Auditing
SOLUIONS "OR RE!IE# CHEC$%OINS
H%$ 4iven its etensive use! auditors must consider clients5 computeri'ed information systems technology% All
auditors should have sufficient familiarity with computers! computeri'ed information systems! and
computer controls to #e a#le to complete the audit of simple systems and to work with information system
auditors% More importantly! auditors must assess the control risk 6and the risk of material misstatement7
regardless of the technology used for preparing the financial statements% In a computeri'ed processing
environment! auditors must study and test information technology general and application controls%
H%( C38I9 6which stands for Control 3#:ectives for Information and Related 9echnology7 represents a set of
#est practices for information technology management that has achieved general acceptance as the internal
control framework for information technology% C38I95s #asic principle is;
9o provide the information the enterprise re1uires to achieve its o#:ectives! the enterprise needs to
invest in and manage and control I9 resources using a structured set of processes to provide the
services that deliver the re1uired enterprise information%
H%) 9he four domains of C38I9 6along with a #rief description of each7 are;
$% Plan and Organize: Summari'es how information and technology can #e used within an entity to
#est achieve its goals and o#:ectives%
(% Acquire and Implement: <ocuses on identifying the related I9 re1uirements! ac1uiring the
necessary technology! and implementing the technology within the entity5s #usiness processes%
)% Delivery and Support: <ocuses on the eecution of applications within the I9 system%
*% Monitor and Evaluate: Considers whether the I9 system continues to meet the entity5s
o#:ectives%
H%* I94C 6information technology general controls7 apply to all applications of a computeri'ed information
system! while I9AC 6information technology application controls7 apply to specific #usiness activities
within a computeri'ed information system% 9hus! I94C operate at an overall entity level and I9AC operate
at a transaction level%
H%+ 9he five ma:or categories of I94C are;
$% Hardware controls: "rovide reasona#le assurance that data are not altered or modified as they are
transmitted within the system%
(% Program development: "rovide reasona#le assurance that 6$7 ac1uisition or development of
programs and software is properly authori'ed! conducted in accordance with entity policies! and
supports the entity5s financial reporting re1uirements= 6(7 appropriate users participate in the
software ac1uisition or program development process= 6)7 programs and software are tested and
validated prior to #eing placed into operation= and 6*7 all software and programs have appropriate
documentation%
)% Program canges: "rovide reasona#le assurance that modifications to eisting programs 6$7 are
properly authori'ed! conducted in accordance with entity policies! and support the entity5s
financial reporting re1uirements= 6(7 involve appropriate users in the program modification
process= 6)7 are tested and validated prior to #eing placed into operation= and! 6*7 have #een
appropriately documented%
M32H-(
Module H - Information Systems Auditing
H%+ 6Continued7
*% !omputer operations: "rovide reasona#le assurance that the processing of transactions through the
computeri'ed information system is in accordance with the entity5s o#:ectives and actions are
taken to facilitate the #ackup and recovery of important data when the need arises%
+% Access to programs and data: "rovide reasona#le assurance that access to programs and data is only
granted to authori'ed users%
H%, Auditors are not epected to #e computer technicians with respect to hardware controls! #ut they should #e
familiar with the terminology and the way these controls operate% 9his will allow auditors to identify
potential issues related to these controls and converse knowledgea#ly with the entity5s computer personnel%
If hardware controls fail! auditors should #e primarily concerned with operator procedures in response to
this failure%
H%- 9he Systems 2evelopment &ife Cycle 6S2&C7 is the process through which the entity plans! develops! and
implements new computeri'ed information systems or data#ases%
9he S2&C includes the following controls related to program development and changes;
Ensuring that software ac1uisition and program development efforts are consistent with the entity5s
needs and o#:ectives%
<ollowing esta#lished entity policies and procedures for ac1uiring or developing software or programs%
Involving users in the design of programs! selection of prepackaged software and programs! and testing
of programs%
9esting and validating new programs and developing proper implementation and >#ack out? plans
prior to placing the programs into operation%
Ensuring that data are converted completely and accurately for use in the new systems%
Ensuring that consistent processes are followed and the most recent version of programs are
implemented%
Considering application controls that should #e incorporated within the system to facilitate the accurate
processing of data and transactions%
"eriodically reviewing entity policies and procedures for ac1uiring and developing software or
programs for continued appropriateness and modifying these policies and procedures! as
necessary%
M32H-)
Module H - Information Systems Auditing
H%. 9he primary duties associated with various functions related to computeri'ed information systems are;
Systems Analyst: Analy'e re1uirements for information! evaluate the eisting system! and design
new or improved computeri'ed information systems%
Programmer: <lowcharts the logic of the computer programs re1uired #y the computeri'ed
information system designed #y the systems analyst%
!omputer Operator: 3perates the computer for each accounting application system according
to written operating procedures found in the computer operation instructions%
Data !onversion Operator: "repares data for machine processing #y converting manual data
into machine-reada#le form or directly entering transactions into the system using remote
terminals%
"i#rarian: Maintains control over 6$7 system and program documentation and 6(7 data files and
programs used in processing transactions%
!ontrol $roup: 9he control group receives input from user departments! logs the input and
transfers it to data conversion! reviews documentation se1uence num#ers! reviews and processes
error messages! monitors actual processing! compares control totals to computer output! and
distri#utes output%
Separation of the duties performed #y systems analysts! programmers! and computer operators is important%
9he general idea is that anyone who designs a computeri'ed information system should not perform the
technical programming work! and anyone who performs either of these tasks should not #e the computer
operator when >live? data are processed% "ersons performing each function should not have access to each
other5s work! and only the computer operators should have access to the e1uipment%
H%/ I94C are important in the auditors5 evaluation of internal control and assessment of control risk 6and the
risk of material misstatement7 #ecause they are pervasive and the effectiveness of application controls
relies heavily on the effectiveness of I94C%
H%$0 9he o#:ective of input controls is to provide reasona#le assurance that data received for processing #y the
computer department have #een properly authori'ed and accurately entered and converted for processing%
H%$$ %ecord counts are tallies of the num#er of transaction documents su#mitted for data conversion% 9hese
counts allow situations in which transactions may not have #een input or may have #een input more than
once to #e identified%
&atc totals are mathematical totals of an important 1uantity or amount! such as the total of sales dollars in
a #atch of invoices% 8atch totals allow the following types of input errors to #e detected; 6$7 input error for
the wrong amount= 6(7 transactions have not #een input= and! 6)7 transactions have #een input more than
once%
Has totals are mathematical totals of a 1uantity or amount that is not meaningful! such as the total of all
invoice num#ers% &ike #atch totals! hash totals allow the following types of input errors to #e detected; 6$7
input error for the wrong amount= 6(7 transactions have not #een input= and! 6)7 transactions have #een
input more than once%
M32H-*
Module H - Information Systems Auditing
H%$( 9he o#:ective of processing controls is to provide reasona#le assurance that data processing has #een
performed accurately! without any omission or duplication of transactions% Eamples of processing controls
include;
%un'to'run totals: 9otals such as record counts! #atch totals! and@or hash totals o#tained at the
end of one processing run are distri#uted to the net run and compared to corresponding totals
produced at the end of the second run%
!ontrol total reports: Control totals! such as record counts! #atch totals! hash totals! and run-to-
run totals! can #e calculated during processing and reconciled to input totals or totals from earlier
processing runs%
(ile and operator controls: Eternal and internal la#els ensure that the proper files are used in
applications%
"imit and reasona#leness tests: 9hese tests should #e programmed to ensure that illogical
conditions do not occur 6for eample! depreciating an asset #elow 'ero or calculating a negative
inventory 1uantity7%
H%$) 9he o#:ective of output controls is to ensure that only authori'ed persons receive output or have access to
files produced #y the system% Some common output controls include;
!ontrol total reports: Compare controls totals to input and run-to-run control totals produced during
transaction processing%
Master )ile canges: Any changes to master file information should #e properly authori'ed #y the
entity and reported in detail to the user department from which the re1uest for change originated%
Output distri#ution: Systems output should only #e distri#uted to persons authori'ed to receive the
output%
H%$* 9he ma:or steps in the auditors5 assessment of control risk in a computeri'ed processing environment
include;
Identify specific control o#:ectives #ased on the types of misstatements that can occur in
significant accounting applications%
Identify the points in the flow of transactions where specific types of misstatements could occur%
Identify specific control procedures designed to prevent or detect these misstatements%
Evaluate the design of control procedures to determine whether the design suggests a low control
risk and whether tests of controls might #e cost-effective%
"erform tests of the operating effectiveness of control procedures designed to prevent or detect
misstatements 6assuming it is cost-effective to do so7%
M32H-+
Module H - Information Systems Auditing
H%$+ 9he following are points in the processing of transactions at which misstatements may #e introduced
#ecause of the use of computeri'ed processing;
$% "reparation of source data for input%
(% Manual summary of data 6preparation of #atch totals and hash totals7%
)% Conversion of source data into computer-reada#le form%
*% Ase of incorrect input files in processing%
+% 9ransfer of information from one computer program to another%
,% Ase of incorrect computer files in processing transactions%
-% Inappropriate initiation of transactions #y the computer%
.% Creation of output files are update of master files%
/% Changes to master files outside the normal flow of transactions within each cycle through file
maintenance procedures%
$0% "roduction of output reports or files%
$$% Correction of errors identified #y control procedures%
H%$, Auditing >though the computer? refers to making use of the computer itself to test the operating
effectiveness of application controls in the program used to process transactions% Bhen auditing >around
the computer?! auditors are only concerned with the correspondence of the input with the output and do not
specifically evaluate the effectiveness of the client5s computer controls%
H%$- Audit oo*s: Client or auditors can select specific transactions of audit@control interest%
+agging transactions: Auditors or client select and >tag? transactions to capture a computer trail of the
transaction%
S!A%( ,systems control audit review )ile-: "rogram that selects transactions according to auditors5 or
client5s criteria 6e%g% reasona#leness limit7%
SA%( ,sample audit review )ile-: "rogram that randomly selects transactions for review%
Snapsot: 9aking a >picture? of main memory of transactions and data#ase elements #efore and after
computeri'ed processing%
Monitoring systems activity: Computeri'ed information system capture of activity records! such as all
passwords used during a period%
E.tended records: Epanding the transaction record itself to include computer trail information! such as
snapshot information #efore and after processing%
H%$. 9he test data techni1ue uses simulated transactions created #y auditors that are processed #y the client5s
actual programs at a different time from the processing of actual client transactions% 9he integrated test
facility techni1ue is an etension of the test data techni1ue! #ut simulated transactions for a >dummy?
department or division are intermingled with the actual client transactions and processed along with actual
client transactions%
H%$/ It is true that fictitious 6fake7 transactions are not used #y auditors when the information processing system
is manual! #ut in a manual system! documentary evidence is availa#le for visual eamination to audit a
client5s control activities% Cew techni1ues are necessary to gather evidence and evaluate controls with
computer programs% 9he client should #e advised of the nature of the test data or integrated test facility and
these procedures must #e carefully controlled to prevent contamination of actual client files%
M32H-,
Module H - Information Systems Auditing
H%(0 8oth test data and parallel simulation are audit procedures that use the computer to test computer controls%
9he #asic difference is that the test data procedure uses the client5s program with auditor-created
transactions! while parallel simulation uses an auditor-created program with actual client transactions% In
the test data procedure! the results from the client program are compared to auditors5 predetermined results
to determine whether the controls operate as intended% In the parallel simulation procedure! the results from
auditors5 program are compared to the results from the client5s program to determine whether the controls
operate as intended%
H%($ Controlled reprocessing is another method of o#taining evidence regarding the operating effectiveness of
the client5s computer controls through parallel simulation% In controlled reprocessing! auditors create the
>simulated system? #y performing a thorough technical audit of the controls in the client5s actual program!
then maintain a copy of this program% Actual client data can later #e processed using this copy of the
client5s program%
H%(( In an end-user environment! limited resources may result in a lack of separation of duties in the accounting
function 6initiate and authori'e source documents! enter data! operate the computer! and distri#ute output7
and computer functions 6programming and computer operations7%
H%() Ma:or characteristics in end-user computing environments include;
9erminals are used for transaction data entry! in1uiry! and other interactive functions%
"urchased software packages are used etensively%
"orta#le storage devices 6compact disks 6C2s7 and Aniversal Serial 8us 6AS87 drives7 are used for file
storage%
Availa#le system! program! operation! and user documentation is often limited or does not eist%
Control pro#lems in end-user computing environments include;
&ack of separation of duties! #oth in accounting functions and computer functions%
&ack of physical security over computer hardware! programs! and data files%
&ack of documentation and testing%
&imited computer knowledge%
H%(* Control procedures an entity can use to achieve control over computer operations in an end-user computing
environment include;
Restricting access to input devices
Standard screens and computer prompting
3n-line editing and sight verification
H%(+ Control procedures an entity can use to achieve control over computeri'ed in an end-user computing
environment include;
9ransaction logs
Control totals
8alancing input to output
Audit trail
H%(, <ive things used to facilitate computer fraud are 6$7 the computer! 6(7 data files! 6)7 computer programs! 6*7
system information 6documentation7! and 6+7 time and opportunity to convert the assets to personal use%
M32H--
Module H - Information Systems Auditing
H%(- "hysical controls that can #e used to protect computeri'ed information systems from fraud include;
Inconspicuous location
Controlled access
Computer room guard 6after hours7
Computer room entry log record
"reprinted limits on documents
2ata #ackup storage
H%(. 9echnical controls that can #e used to protect computeri'ed information systems from fraud include;
2ata encryption
Access control software and passwords
9ransaction logging reports
Control totals 6#oth #atch totals and hash totals7
"rogram source comparison
Range checks on permitted transaction amounts
Reasona#leness check on permitted transaction amounts
H%(/ Administrative controls that can #e used to protect computeri'ed information systems from fraud include;
Security checks on personnel
Separation of duties
"roper review of access and eecution log records
"rogram testing after modification
Rotation of computer duties
9ransaction limit amounts
H%)0 Methods of limiting damages resulting from computer fraud 6through damage-limiting controls7 include;
Rotation of computer duties
9ransaction limit amounts
Range checks on permitted transaction amounts
"reprinted limits on documents 6e%g%! checks7
2ata #ackup storage
Reasona#leness check on permitted transaction amounts
SOLUIONS "OR MULI%LE&CHOICE 'UESIONS
H%)$ a% Incorrect 9his is a software function%
#% Incorrect 9his is a programmer function%
c% Incorrect 9his is an input control function%
d% Correct 9his is an automated hardware function%
H%)( a% Correct A payroll processing program is an eample of user software%
#% Incorrect 9he operating system program is an eample of a system program%
c% Incorrect 2ata management system software is an eample of a system program%
d% Incorrect Atility programs are eamples of system programs%
M32H-.
Module H - Information Systems Auditing
H%)) a% Incorrect 9he computer li#rarian is the appropriate person to maintain these files! since
this individual has no access to the computer%
#% Correct Computer operators should not have access to instructions and detailed program
lists! since they have would have enough knowledge to alter programs and run
those programs%
c% Incorrect 9he control group is appropriate for distri#uting output! since they do not have
access to programs and computer%
d% Incorrect "rogrammers are the appropriate individuals to write and de#ug programs! since
they have no access to data%
H%)* a% Incorrect Employee intelligence is not necessarily greater in a computeri'ed environment%
#% Incorrect 2ue to the limitations of computer evidence 6it may only eist for a very #rief
time7! auditors should audit the computeri'ed information system throughout the
year%
c% Incorrect &arge dollar amounts are not uni1ue to a computeri'ed environment%
d% Correct 2ue to the accessi#ility of large num#er of computer terminals! employees have
greater access to computeri'ed information systems and computer resources in a
computeri'ed environment%
H%)+ a% Incorrect Control totals detect input and processing errors%
#% Incorrect Record counts are used to ensure that all transactions are entered once! and only
once%
c% Incorrect &imit tests identify items larger than epected during input or processing%
d% Correct Eternal la#els reduce the likelihood that operators will not use the incorrect
file%
H%), a% Incorrect Copies of client data files for controlled reprocessing should #e o#tained from
the client! #ut not etracted using CAA9s%
#% Correct CAA9s can #e used to create a parallel simulation to test the client5s computer
controls%
c% Incorrect CAA9s are not designed to perform tests of a client5s hardware controls%
d% Incorrect Attempting to enter false passwords is the #est way to test the operating
effectiveness of a client5s password access control! not the use of CAA9s%
H%)- a% Correct It may #e appropriate to audit simple systems without testing computer
programs= essentially! the client is using this system in a manner similar to a
calculator%
#% Incorrect 9he impact of computeri'ed processing on master files would re1uire the
computer programs to #e tested%
c% Incorrect Auditors cannot audit >around the computer? when limited output is availa#le%
d% Incorrect See 6b7 and 6c7%
H%). a% Incorrect Condensing data would not necessarily result in a more efficient audit%
#% Correct A#normal conditions inform auditors of potential issues and allow them to focus
their efforts on these issues%
c% Incorrect Reduced tests of controls would depend upon the content of the eemption
reports 6i%e%! num#er of eceptions7! not the eistence of these reports%
d% Incorrect Eception reporting is an eample of an output control! not an input control%
M32H-/
Module H - Information Systems Auditing
H%)/ a% Incorrect 9he use of test data evaluates computer controls! not input data%
#% Incorrect Machine capacity can #e evaluated #y reference to the manufacturer5s
specifications%
c% Correct 9est data are used to eamine the operating effectiveness of computer control
procedures%
d% Incorrect 9est data provide evidence on specific application control procedures! not
information technology general controls%
H%*0 d% Correct In a computeri'ed processing environment! a sample of one transaction is
sufficient #ecause the computer handles all transactions identically%
H%*$ NOTE TO INSTRUCTOR: Since this question asks students to identify the statement that is not true, the
response labeled correct is not true and those labeled correct are true.

a% Incorrect 9he test data approach does test the client5s computer programs%
#% Incorrect 9est data need to include only the transactions that test control procedures
auditors #elieve to #e important%
c% Correct 9est data need to include only the transactions that test control procedures
auditors #elieve to #e important%
d% Incorrect 3ne of each deviation condition is sufficient! #ecause the computer handles each
transaction in an identical manner%
H%*( a% Incorrect Auditors may su#mit test data at several different times to gain additional
assurance on the processing of transactions%
#% Incorrect Manually comparing detail transactions to the program5s actual error messages
is a way of verifying the operation of computer control procedures%
c% Incorrect Comparing transactions processed through a separate program to those
processed through the client5s program is a form of parallel simulation and will
test the operation of computer controls%
d% Correct 9his is an eample of auditing >around the computer? and will not test the
operation of computer control procedures%
H%*) a% Incorrect Briting a computer program that simulates the logic of a good password control
system does not test the actual system%
#% Incorrect A test of proper authori'ation is not a test of actual access to the system%
c% Correct Attempting to sign onto the computer system with a false password is similar to
a test data approach% Several different types of false passwords might need to #e
used%
d% Incorrect Britten representations are not direct or relia#le form of evidence on a detailed
matter such as password controls%
H%** a% Incorrect In1uiries produce a relatively weak form of evidence%
#% Incorrect 3#servation is not relevant to the performance of computer controls%
c% Correct 9his method will test computer controls since it compares known input with
computer output%
d% Incorrect 9he run manual provides information to the computer operator and does not
allow auditors to test computer controls%
M32H-$0
Module H - Information Systems Auditing
H%*+ a% Incorrect Computers do not make mathematical errors%
#% Correct Bhen personal computers are used! it is easier for unauthori'ed persons to
access the computer and alter data files%
c% Incorrect 9ransaction coding prior to computeri'ed processing is necessary and an
advantage to an entity%
d% Incorrect 9he rarity of random errors in report printing is an advantage! not a
disadvantage%
H%*, a% Incorrect 8atch processing involves delays in processing transactions%
#% Correct Real-time processing handles transactions as they occur and does not have the
delays associated with #atch processing%
c% Incorrect Integrated data processing refers to situations in which multiple users access
elements in a data #ase and is not involved with the timeliness of processing
transactions%
d% Incorrect Random access processing refers to the use of disk files versus tape files and is
not involved with the timeliness of processing transactions%
H%*- NOTE TO INSTRUCTOR: Since this question asks students to identify the statement that is not a
characteristic of a batch processing system, the response labeled correct is not a characteristic of a
batch processing system and those labeled correct are examples of a batch processing system.
a% Incorrect In a #atch processing system! all transactions are processed at a single time%
#% Incorrect 9his is a characteristic of #atch processing systems%
c% Incorrect 8atch processing systems produce printouts and reports as the transactions are
processed through the system%
d% Correct 9his characteristic descri#es a real-time processing system%
H%*. a% Correct Check digits are im#edded algorithms that prevent incorrect characters from
#eing input%
#% Incorrect Record counts involve totaling the num#er of items input% In this case! the
correct num#er of transactions would #e input! so a record count would not
detect the error
c% Incorrect Hash totals involve a num#er of transactions! not single transactions%
d% Incorrect A redundant data check is a hardware control to make sure that computers
properly communicate with each other%
H%*/ a% Incorrect Se1uence checking test the input data for numerical se1uence of documents
when se1uence is important for processing! as in #atch processing% 9his control
does little to address transaction accuracy%
#% Correct 8atch totals sum dollar amounts of items that have numerical significance 6such
as inventory data7% 9hese totals will address the completeness and accuracy of
data input%
c% Incorrect &imit checks are input controls that prevent num#ers outside of a specified range
from #eing incorrectly input% 9hese controls might address accuracy! #ut not
completeness%
d% Incorrect Check digits are im#edded algorithms that prevent incorrect characters from
#eing input! #ut provide little assurance that data are completely entered%
H%+0 a% Incorrect "rogrammers code the logic in the computer program%
#% Incorrect 2ata conversion operators prepare data for computeri'ed processing%
c% Correct 9he li#rarian controls access to systems documentation and access to program
and data files%
d% Incorrect Computer operators operate the computer for each application according to
written operating procedures found in the computer operation instructions%
M32H-$$
Module H - Information Systems Auditing
SOLUIONS "OR E(ERCISES) %ROBLEMS AND SIMULAIONS
H%+$ Auditing /around0 versus Auditing /troug0 !omputers
a% Auditing >around? the computer generally refers to auditors reconciling inputs to processing
results% &ittle or no attempt is made to audit the computer controls! programs! or procedures
employed #y the computer to process the data% 9his audit approach is #ased on the premise that
the method of processing data is irrelevant as long as the results can #e traced #ack to the input of
data and the input can #e validated% If the sample of transactions has #een handled correctly! then
the system outputs can #e considered to #e correct within a satisfactory degree of confidence%
#% Auditors would decide to audit >through? the computer instead of >around? the computer when 6$7
the computer applications are comple or 6(7 audit trails #ecome partly o#scured and eternal
evidence is not availa#le% Auditing >around? the computer would #e inappropriate and inefficient
when the ma:or portion of the client5s internal controls are em#odied in the computer system and
when accounting information is intermied with operation information in a computer program that
is too comple to permit the ready identification of data inputs and outputs% Auditing >around? the
computer will also #e ineffective if the sample of transactions selected does not include unusual
transactions that re1uire special treatment%
c% 6$7 9est data are a set of data representing a full range of simulated transactions! some of
which may #e erroneous! to test the effectiveness of the computer controls and to
ascertain how transactions would #e handled 6accepted or re:ected7 and if accepted! the
effect they would have on the accumulated accounting data%
6(7 Auditors may use test data to gain a #etter understanding of what the computeri'ed
information system does! and to check its conformity to desired o#:ectives% 9est data may
#e used to test the processing accuracy #y comparing computer results with results
predetermined manually% 9est data may also #e used to determine whether errors can
occur without o#servation and thus test the system5s a#ility to detect noncompliance with
prescri#ed procedures and methods%
d% 9o ensure that the auditors are using the client5s actual computer programs! they can either re1uest
the program from the li#rarian on a surprise #asis or re1uest access to the program immediately
following the client5s use of the program to process transactions%
H%+( !omputer Internal !ontrol 1uestionnaire Evaluation
Does access to online )iles require speci)ic passwords to #e entered to identi)y and validate te
terminal user2 Anauthori'ed access may #e o#tained to programs or data resulting in the loss of assets or
other entity resources through theft or fraud%
Does te user esta#lis control totals prior to su#mitting data )or processing2 Sales transactions may
#e lost in data conversion or processing! or errors made in data conversion or processing%
Are input totals reconciled to output control totals2 Control totals are not useful unless they are
reconciled to e1uivalent totals determined following processing% As a result! auditors would fail to detect
errors made in the input or processing of data%
M32H-$(
Module H - Information Systems Auditing
H%+) &atc versus %eal'+ime Processing
a% Bhen using #atch processing! a group of similar transactions is processed simultaneously! using the
same program% In contrast! real-time processing involves processing transactions as they occur
without delay%
8atch processing is more likely to #e used in situations where transactions occur at periodic and
infre1uent intervals 6such as payroll transactions7% Real-time processing is more likely to #e used
in situations where transactions occur fre1uently and more immediate processing is necessary
6such as sales made to the entity5s customers7%
#% Bith respect to input controls! #oth methods of processing allow for controls related to individual
transactions to #e implemented! such as the use of check digits! valid character tests! valid sign
tests! se1uence tests! limit and reasona#leness tests! and error correction and resu#mission%
However! #ecause transactions are not collected 6or >#atched?7 in a real-time processing
environment! the use of record counts! #atch totals! and hash totals is not possi#le% 9he collection
of transactions in a #atch processing system allows these types of controls to #e used%
H%+* (ile %etention and &ac*up
a% A grandfather-father-son file retention policy involves retaining two predecessor master and
transaction files as #ackup for the current file% 9his provides a method for reconstructing the files
in the event of accidental destruction of a file used during processing%

#% Retaining two generations of #ackup files generally provides ade1uate protection% An additional
generation might #e maintained if the file is crucial or if there is a high rate of file destruction%
Since all files are stored together! they are vulnera#le to loss through a common catastrophe! such
as fire! theft or a malicious act% <or this reason it is desira#le that at least one generation of
#ackup files #e maintained in a separate location that is well protected from environmental ha'ards
such as fire or magnetic interference% Access to #oth storage areas should #e limited! and the
li#rarian function should #e specifically assigned%
H%++ Separation o) Duties and $eneral !ontrol Procedures
a% 9he primary internal control o#:ectives in separating the programming and operating functions are
achieved #y; 6$7 preventing operator access to the computer or to input or output documents= 6(7
preventing operator access to operating programs and operating program documentation= and! 6)7
preventing operators from developing or modifying programs%
"rogrammers should not #e allowed in the computer room during processing% 9hey should su#mit
their tests to #e scheduled and run #y the operators as any other :o#%
3perators should not #e allowed to interfere with the running of any program% If an application
fails! the operators should not #e allowed to attempt to fi the programs% 9he failed application
should #e returned to the programmers for correction%
#% In a small computer installation where there are few employees! separation of the programming
and operating functions may not #e possi#le 6as in an end-user computing environment7%
Important compensating controls for the lack of segregation of duties include;
M32H-$)
Module H - Information Systems Auditing
Comparison of manual control totals with totals from computer output%
Careful inspection of output for accuracy%
Doint operation #y two or more operators%
Rotation of assigned duties among individuals%%
Comparison of computer use time to averages or norms and investigation of ecess usage%
"roper supervision of all computer operations%
Re1uired vacations for all employees%
H%+, !omputer (rauds and Missing !ontrol Procedures
a% 9he following control procedures were either not esta#lished or not operating properly;
Authori'ation and data entry 6recordkeeping7 functions are not appropriately separated%
Receipt 6receiving report7 not matched or independently coded%
Co approved master file of authori'ed vendors for matching payees to authori'ed vendors%
Co range checks or limit or reasona#leness tests if the check amounts were large 6average of
E)$!000 in the entity7%
#% 9he following control procedures were either not esta#lished or not operating properly;
&ack of separation of employee accounts from investors5 accounts for control group review of
activity%
<ailure to log employee-investor transfer transactions that would detect this type of
manipulation%
c% In this case! password access controls were not esta#lished or operating properly%
d% In this case! the time in the system was not checked against the actual time%
H%+- In)ormation +ecnology $eneral !ontrols
9ype of I94C 3#:ective 9est of control
a% Hardware 9he entity5s computer
e1uipment functions effectively
and according to esta#lished
specifications%
Either in1uire of the entity5s
management as to the maintenance
or inspect documentary evidence
that the maintenance was
performed%
#% Access to programs and
data
3nly authori'ed individuals
have the a#ility to access the
entity5s computer files and
programs%
Attempt to >log in? using a
fictitious password%
Ferify 6through in1uiry or
documentary evidence7 that
passwords are modified every
three months%
M32H-$*
Module H - Information Systems Auditing
c% "rogram change All >emergency? change
re1uests are properly authori'ed
#y the entity and consistent
with the entity5s o#:ectives%
Inspect documentary evidence
showing authori'ation of
>emergency? change re1uests%
d% Computer operations 9he entity is protected from
losses or destruction of files%
Inspect the #ackup and storage of
files in safe! off-site locations%
e% "rogram development "rograms and prepackaged
software will meet the entity5s
users5 needs%
In1uire of the entity5s
management or inspect
documentary evidence that users
are involved in the design of
programs and selection of
prepackaged software%
f% Computer operations Significant delays in processing
transactions will not occur%
Inspect documentary evidence of
how processing failures are
resolved! paying particular
attention to the timeliness of the
resolution%
g% "rogram development "rograms developed #y the
entity will meet their processing
needs%
Inspect documentary evidence that
the entity5s needs and o#:ectives
were considered in the program
development process%
h% "rogram change Individuals within the entity
can identify the reasons for the
modification and all
modifications are done for
legitimate purposes%
Inspect documentary evidence that
program modifications are
properly documented%
H%+- In)ormation +ecnology $eneral !ontrols ,!ontinued-
i% Computer operations Individuals within the entity are
not in position to engage in a
fraudulent defalcation scheme%
In1uire as to the separation of
duties or! through direct
o#servation! verify that
incompati#le functions are not
#eing performed #y certain
individual6s7%
:% Access to programs and
data
"rograms are not #eing
accessed #y unauthori'ed
individuals and users%
Inspect documentary evidence of
comparisons #etween the user
listing and record of user access%
k% Hardware 2ata will #e correctly
transmitted #y the computer as
it moves through the
computeri'ed information
system%
Inspect hardware specifications
from the computer vendors%
M32H-$+
Module H - Information Systems Auditing
H%+. In)ormation +ecnology Application !ontrols: Input !ontrols
NOTE TO INSTRUCTOR: Below is one possible response for each control. thers are possible,
depending upon the data item selected by the student.
a% A check digit can #e calculated and appended to the employee num#er to ensure accurate input of
the employee num#er% Check digits are most appropriate for this data item! since it is entirely
numeric 6unlike the entity division7 and will remain constant over time 6unlike the hours worked7%
#% 8rady can count the total num#er of employee attendance records su#mitted and compare this to
the total num#er of records entered into the computeri'ed information processing system%
c% 9he total hours worked can #e determined prior to input and compared to the total entered into the
computeri'ed information processing system%
d% 9he total of the employee num#ers can #e determined prior to input and compared to the total
entered into the computeri'ed information processing system 6the entity division is an
alphanumeric field! so a hash total on this field would not #e possi#le7%
e% Controls can #e implemented to ensure that only numeric information is entered for employee
num#ers and hours worked! while permitting alpha#etic entries in the first two fields of the entity
division and numeric entries in the last three fields of the entity division%
f% Controls can #e implemented to ensure that negative entries are not permitted for employee
num#er! entity division! and hours worked%
g% Controls can #e implemented to identify entries for a large num#er of hours worked 6for eample!
greater than $00 hours per week7% &imit or reasona#leness tests would generally not #e appropriate
for either employee num#er or entity division%
h% Controls should allow personnel to correct any errors identified #y the input controls noted in 6a7
through 6g7 a#ove and promptly resu#mit the transaction for processing%
H%+/ Audit Simulation: Identi)y !omputer !ontrol 3ea*nesses
a%
Beaknesses Recommendations
&ack of separation of duties Computer operations! program changes! and
maintenance of computer logs should #e performed
#y different people%
&i#rarian function does not eist Custody and control over data#ases and system
documentation should #e under a li#rarian function
and not rotated among computer operators%
Computer programmers have access to
computer room
Modify access procedures to restrict access to the
computer room to computer operators only%
2eficient documentation 2ocumentation of flowcharts! program changes!
systems software! and testing should #e re1uired%
M32H-$,
Module H - Information Systems Auditing
Co computer price list <or manual entry process! clerk should not need to
manually enter the sales price% 9his information
should #e accessed from a computer file%
Cumerical se1uence of shipping notices is
manually checked #y the #illing clerk
9he computer should #e used to check numerical
se1uence of shipping notices%
Control totals determined #y the #illing clerk
do not appear to #e used appropriately%
9he #illing clerk5s control total of sales should #e
used to compare to total sales processed #y the
computer%
3pen invoice file serves as a detail accounts
receiva#le record%
9he computeri'ed information system should #e
programmed to maintain customer accounts
receiva#le records%
#% Shipping clerks could enter the date! customer identification num#er! shipment 1uantities! and
product identification num#ers in a terminal% 9hen the computer system could automatically
produce a sales invoice%
Controls include;
Autoclock date checking
Check digits for customer identification num#ers and product identification num#ers%
Hash total of customer identification num#ers
Automatic num#ering of sales invoices
Ase of authori'ed price list through reference to computer files%
Control total comparison of hash totals of identification num#ers in run-to-run totals
H%,0 Audit Simulation: Identi)y !ontrol 3ea*nesses and %ecommendations
Beakness Recommended Improvements
$% Computer department functions have not #een
appropriately separated! since one
employee completely controls
programming and operations%
9he functions of systems analysis and design
programming and computer operations should #e
separated%
(% Records of computer operations have not #een
maintained%
In order to properly control usage of the
computer! a usage log should #e kept and
reconciled #y the supervisor%
)% "hysical control over computer operations
is not ade1uate% All computer department
employees have access to the computer%
3nly operating employees should have access to
the computer room% "rogrammers5 usage should
#e limited to program testing and de#ugging%
*% System operations have not #een
ade1uately documented% Co record has
#een kept of adaptations made #y the
programmer or new programs%
9he entity should maintain current system and
program flowcharts! record layouts! program
listings and operator instructions% All changes in
the system should #e documented%
M32H-$-
Module H - Information Systems Auditing
+% "hysical control over files and system
documentation is not ade1uate% Materials
are unguarded and readily availa#le in the
computer department%
"rograms and file li#raries should #e carefully
controlled in a separate location! prefera#ly #y a
li#rarian who does not have access to the
computer%
,% 9he entity has not made use of computer
controls% Some of the procedures and
controls used in the ta#ulating system may
#e unnecessary or ineffective in the
computeri'ed information system%
Computer controls should #e used to supplement
eisting manual controls! and an independent
review should #e made of manual controls and
ta#ulating system procedures to determine their
applica#ility% Eamples of computer controls that
might #e programmed include data relia#ility
tests! check digits! limit and reasona#leness tests!
se1uence checks and error routines for unmatched
items! erroneous data and violations of limits%
-% Manual insertion of prices on shipping
notices #y the #illing clerk in inefficient
and su#:ect to error%
9he entity5s price list should #e included in a
master file and matched with product num#ers on
the shipping notices to o#tain appropriate prices%
.% Manual checking of the numerical
se1uence of shipping notices #y the #illing
clerk is inefficient and su#:ect to error%
9he computer should #e programmed to check the
numerical se1uence of shipping notices and
provide a report with any missing num#er6s7%
/% Control over computer input is not
effective% 9he computer operator has #een
given responsi#ility for checking
agreement of output with the control tapes%
9his is not an independent check%
9he #illing clerk 6or another designated control
clerk7 should retain the control tapes and check
them against the daily sales register% 9his
independent check should #e supplemented #y
programming the computer to check control totals
and print error messages where appropriate%
H%,0 Audit Simulation: Identi)y !ontrol 3ea*nesses and %ecommendations ,!ontinued-
Beakness Recommended Improvement
$0% 9he #illing clerk should not maintain
accounts receiva#le detail records%
If receiva#le records are to #e maintained
manually! a receiva#le clerk who is independent
of #illing and cash collections should #e
designated% If the records are updated #y the
computer department! as recommended #elow!
there still should #e an independent check #y the
general accounting department%
$$% Accounts receiva#le records are maintained
manually in an open invoice file%
9hese records could #e maintained more
efficiently in a computer file%
$(% 9he #illing clerk should not receive or mail
invoices%
Copies of invoices should #e forwarded #y the
computer department to the customer 6or to the
mailroom7 and distri#uted to other recipients in
accordance with esta#lished procedures%
$)% Maintaining a chronological file of
invoices appears to #e unnecessary%
2iscontinue practice of maintaining a
chronological file of invoices% 9his file5s purpose
may #e fulfilled #y the daily sales register%
M32H-$.
Module H - Information Systems Auditing
$*% Sending duplicate copies of invoices to the
warehouse is inefficient%
9he computer can #e programmed to print a daily
listing of invoices applica#le to individual
warehouses% 9his will eliminate the sorting of
invoices%
H%,$ Audit Simulation: In)ormation +ecnology Application !ontrols
$% 9he use of a login protocol appears to #e an effective control! since the #eginning and ending times of
an employee5s workday cannot #e altered or manipulated #y that employee% As with any process
of this type! the possi#ility eists that employees may log in! leave the premises! and return to log
out at a later time without actually performing work responsi#ilities% However! this #ehavior
would undou#tedly #e identified #y that employee5s supervisor at some later time%
(% Re1uiring Merriman5s employees to approve their own attendance records prior to su#mission allows
unusual situations to #e identified 6for eample! an employee forgetting to log in or log out on a
particular workday7% Authori'ation of these records also provides the entity with appropriate
evidence of intent in cases where employees attempt to engage in fraudulent activities with respect
to su#mitting false attendance information! since employees cannot indicate they were unaware of
the hours they su#mitted%
)% Supervisory approval is an effective control as it serves as the first line of defense in detecting
fraudulent employee activities with respect to attendance information% 9his control may #e
effective for Merriman in identifying situations where a terminated employee has not #een
removed from the payroll% <inally! it may identify situations where salaried employees are not
working sufficient hours%
H%,$ Audit Simulation: In)ormation +ecnology Application !ontrols ,!ontinued-
*% In data conversion! a num#er of input controls should #e considered% Some eamples follow;
A check digit can #e calculated for each employee num#er and appended to that num#er%
!ecord counts of the num#er of employee records can #e made prior to input and compared to
totals generated #y the computer program following data conversion%
Batch totals 6using hours worked7 and hash totals 6using attendance record num#ers and
employee num#ers7 can #e calculated prior to input and compared to totals generated #y
the computer program following data conversion%
"alid character tests can re:ect any entry that includes an alpha#etic character 6assuming that
the reference num#er and employee num#er are comprised eclusively of numeric
characters7%
"alid sign tests will ensure that no negative amounts are entered for hours worked%
#issing data tests can re:ect any entry that does not include #oth the employee num#er and
the hours worked%
Sequence tests can identify any missing payroll attendance records%
M32H-$/
Module H - Information Systems Auditing
$imit or reasonableness tests can #e used to identify any hours worked that eceed some
reasona#le threshold 6for eample! greater than $+0 hours in any two-week payroll
period7%
+% "rior to processing! it is important that any errors in data conversion which may #e detected #y the
input controls noted in 6*7 are corrected and resu#mitted prior to processing% 9his correction
should allow any data conversion errors to #e resolved in a timely fashion and not unnecessarily
delay the processing of other employee records within the #atch%
At this point! the following processing controls could #e considered;
%ontrol total reports could #e generated and summari'ed for attendance record num#ers
6hash total7! employee num#ers 6hash total&! and hours worked 'batch total7%
9he num#er of records processed can #e identified and compared to the num#er of attendance
reports su#mitted 6record count7%
9he use of file labels 6either internal or eternal7 provides reasona#le assurance that the most
recent version of the payroll master file was used in processing payroll transactions%
$imit and reasonableness tests can #e used to identify processing errors 6for eample!
identifying any employee with a #i-weekly gross pay in ecess of E+00!000 or less than
E+007%
H%,$ Audit Simulation: In)ormation +ecnology Application !ontrols ,part 45 !ontinued-
3n additional issue relates to the hours worked #y salaried employees% A limit or reasonableness
test could identify situations where salaried employees are not working sufficient hours to :ustify
their level of compensation% 9his test could identify situations where the hours worked #y salaried
employees are less than some predetermined threshold 6for eample! (0 hours per week7%
<inally! Merriman could modify their system to eliminate the data conversion process in 6*7 and
use the computer records su#mitted #y employees without the intermediate step of data
conversion% If so! run(to(run totals could #e used to provide reasona#le assurance that all records
have #een received for processing and no records were processed more than once%
,% 9he calculation of deductions is! in some sense! an etension of the calculation of gross pay% Assuming
that the controls in 6+7 are implemented! similar controls would #e effective in determining
deductions and net pay 6particularly limit and reasonableness tests&. 3ther controls related to this
step include;
9he use of standardi'ed income ta and <ICA withholding ta#les provides reasona#le
assurance that these deductions are accurately determined using the employees5
withholding information%
9he use of file labels 6either internal or eternal7 provides reasona#le assurance that the most
recent version of the payroll master file was used in calculating deductions% Employee
withholding information 6num#er of eemptions! contri#ution levels to *0$6k7 plans! etc%7
is likely to change more fre1uently than their pay information 6wage rate or salary7!
making this control particularly important for withholdings%
M32H-(0
Module H - Information Systems Auditing
-% Review of the payroll register provides reasona#le assurance that >o#vious? processing errors
6etraordinarily high or low levels of gross pay! deductions! or net pay7 are identified% 3ther
controls that could #e considered #y Merriman are;
9he data control group should reconcile control totals calculated through processing to the
corresponding totals that are produced as output #y the data control group%
Any changes to the employees5 master file records should #e reported to the re1uesting
department%
9he distri#ution of the payroll register should #e limited to specific individuals%
.% <or funds electronically transferred! Merriman should periodically verify appropriate account
information for employees as well as verify that the designated employees are still employed #y
Merriman% <or paychecks! Merriman should keep these in a safe place! under the control of
individuals who are otherwise not involved in the processing of payroll transactions% In addition!
Merriman should verify that employees are still employed #y Merriman and re1uest proper
identification prior to distri#uting paychecks to employees%
H%,( (lowcart !ontrol Points
$% Control over issuance and retirement of #adges%
(% Control totals developed from input card punch operation with comparison to detail records to
ensure that all cards are processed accurately%
)% Control over authority for master file changes and over custody of the master file%
*% Controls to ensure that eceptions are resolved #y the foreman 6e%g%! review procedures or a
surprise audit! if necessary%7
+% Control over authority to issue special and indirect la#or charges to maintain integrity of cost
accounting system%
,% Control totals developed for input :o# transaction cards and output error listing to ensure that all
cards are processed and reprocessed accurately% Controls to ensure that all re:ected and erroneous
transactions are cleared promptly 6e%g%! review procedures and a surprise audit! if necessary7%
H%,) Audit Simulation: Internal !ontrol !onsiderations in an End'6ser !omputing Environments
Although the addition of personal computers may well prove #eneficial to Chicago Appliance! a num#er of
apparent internal control weaknesses eist that could have serious ramifications%
$% 9he diskettes are stored near the computer! and employees are >encouraged? to eperiment with
the computer% 9hus! many employees appear to have access to the accounts receiva#le and fied
asset diskettes% Such access could result in improper alteration to the related data or programs%
(% 9he accounts receiva#le program was partially reprogrammed #y the controller and thus appears
readily suscepti#le to change% 9ampering with a >live? program could result in the improper
processing of data%
M32H-($
Module H - Information Systems Auditing
)% 9he accounts receiva#le program does not leave an audit trail% Account #alances are updated! #ut
no transaction record of the individual #illings and payments is made 6only invoice or check
amounts are entered into the system! and not invoice num#ers! dates! etc%7% As a result! it would #e
very time consuming to investigate any differences that might arise #etween the accounts
receiva#le detail and general ledger #alance or #etween Chicago Appliance5s and customer5s
records%
*% Co mention was made of whether the fied asset program was ade1uately tested% Although it is
supposedly >state-of-the-art?! it may not compute depreciation and net #ook value on a #asis
consistent with Chicago Appliance5s policies%
+% 9he fied asset clerk5s reluctance to use the computer implies that proper training may not have
taken place% In addition! ade1uate systems or application documentation may not eist%
Accordingly! improper use of the fied asset program is not an unreasona#le possi#ility%
,% 9he fied asset processing appears to lack separation of duties% 9he fied asset clerk will #e
responsi#le for processing future fied asset transactions and generating general ledger entries%
H%,) Audit Simulation: Internal !ontrol !onsiderations in an End'6ser !omputing Environments
,!ontinued-
-% It is relatively simple to use a personal computer to access data files in a minicomputer% Co
mention was made as to whether any controls were esta#lished to prevent this from occurring! and
thus it may #e possi#le for the minicomputer data files or programs to #e improperly altered #y
using the personal computer as a terminal%
Implications for the Audit "lan
Auditors would need to make in1uiries to confirm whether some of the potential internal control
weaknesses mentioned a#ove could affect the audit or are mitigated #y other controls and procedures%
However! #ased on the availa#le information! the apparent weaknesses are significant enough to cause
serious concern as to whether controls surrounding the end-user applications are sufficiently relia#le to
produce proper financial statement information%
If auditors determine that the internal control weaknesses are not mitigated #y other controls and
procedures! the audit approach in the fied asset and accounts receiva#le areas would pro#a#ly #e #ased
largely on su#stantive procedures% <or eample! auditors might perform the confirmation of accounts
receiva#le at year end rather than interim in order to make certain that the detailed trial #alance can #e used
to support the general ledger #alance and to assess the reserve for #ad de#ts%
Auditors must #e aware that many of the control features that apply in larger minicomputers or
>mainframe? installations typically will not #e present in the end-user environment% Bhen personal
computers are used in applications or situations similar to the Chicago Appliance case! control over
accounting applications may #e :eopardi'ed #y insufficient separation of duties! fewer processing controls!
and a casual operating environment% Bhen these circumstances are encountered! auditors should in1uire
regarding other controls! such as; 6$7 management involvement in the review and approval of transactions
and reports and 6(7 clear and distinct audit trails over transaction processing! to determine whether reliance
on controls in end-user computing environments is warranted%
M32H-((
Module H - Information Systems Auditing
H%,* +est Data +ransactions in a Payroll Processing Program
93; Audit "artner
<R3M; Auditor
2A9E;
SA8DEC9; Control deficiencies in payroll calculation program
I tested the program for controls the client asserted were present and for controls that should eist in the
program% Each is descri#ed #elow% 62etail audit documentation showing the test transactions can #e
attached%7
$% "rogram check for valid employee identification
9he program does not actually check for valid employee identification as the client asserted% I
studied the program code itself and saw that it checked for some valid social security num#ers #y
disallowing num#ers lower than the lowest num#er issued 600$-0$-000$7 and num#ers higher than
the highest num#er currently issued 6,(,-0$-////7% It also disallowed num#ers in the -00G series
for people with railroad retirement se1uence num#ers% I entered some fictitious num#ers known
not to #e issued! and the system calculated gross and net pay%
(% "rogram test of pay rate for reasona#leness
9he program does not test for pay rates less than the minimum wage% I tested transactions with pay
rates #elow minimum wage and they were processed% 9he program does test for unrealistically
high pay rates 6varia#le setting at E(+ per hour or more7! and this control works properly%
9here are no controls to verify that employees are paid at their approved rate% Employees can #e
epected to complain a#out #eing paid less than the rate authori'ed and get additional
error-correction pay% Employees may or may not report #eing paid too much%

3verpayments! if any! are epensed in the normal course of accounting! so net income will not #e
misstated% However! we can consider making a control recommendation to management a#out the
possi#ility of overpayments that have a negative effect on net income%
)% &imit test on regular hours of *0 or more
9he limit and reasona#leness controls for disallowing regular pay for any hours in ecess of *0
hours works properly% 9est transactions with more than *0 regular hours returned the >'ero pay?
error message% However! the program has no valid sign test% 9est transactions with a negative
num#er of regular hours calculated a negative amount of gross and net pay% Be should scan the
payroll register computer files to determine whether any >negative pay? was calculated during the
year%
*% 3vertime paid at the rate of $+0 percent of regular pay rate
9he program is properly set up to calculate overtime pay at $+0 percent of the regular pay rate
#ased on the num#er of overtime hours input% 9est transactions proved the program calculations% I
also found the specification of $+0 percent of the regular rate in the program code%
9he client has an additional limit and reasona#leness control on overtime pay% 9he program
returns >'ero pay? for overtime greater than a maimum num#er of hours% However! at the time of
test! the maimum was -( hours! indicating a potential allowa#le $,-hour workday! - days per
week% Regular pay and deductions are calculated accurately% 9his could #e a good limit test to
prevent overreporting and input error on overtime pay if the limit were lower%
M32H-()
Module H - Information Systems Auditing
H%,* +est Data +ransactions in a Payroll Processing Program ,!ontinued-
+% "roper calculation of ta withholdings
9est transactions show that the social security! Medicare! and income ta deductions are calculated
at the proper rates 6,%(H for social security! $%*+H for Medicare! and ()H for income ta7%
However! the wage limit for the social security is improperly specified% It should #e E/-!*00! #ut it
is in the payroll program at E/*!(00! the wage limits in effect from previous years% 9esting
transactions for employees with earnings to date greater than E/*!(00 showed that no social
security ta was deducted%

Also! the program tests the year-to-date wages for the social security wage limits! #ut it does not
account for the increment when the current pay causes the total to eceed the limit% Bhen the
current pay results in year-to-date wages eceeding the limit! the deduction is still calculated on
the full amount of the current pay% 9he result is over withholding these taes the first time the limit
is reached during a pay period%
9he client needs to recalculate the social security for all persons with earnings over the prior-year
limits and calculate the amount of ta due 6#oth employee and employer portion7% Amended
payroll ta returns should #e filed immediately to minimi'e IRS penalties%
,% 3vertime hour control when regular time is less than *0 hours
Having found the limit and reasona#leness test for regular hours of *0 or more! I noticed that the
program will calculate and pay overtime hours even when the regular time is less than *0 hours%
9his is illogical% Employees cannot #oth work fewer than *0 regular hours and overtime hours
6more than *07% 9esting transactions with fewer than *0 regular hours and some overtime hours
resulted in the preparation of a paycheck for the regular hours at the regular rate and the overtime
hours at the overtime rate%
Be should consider a recommendation to management to institute the control of >no overtime
unless regular time eceeds *0 hours?% 9his may save the client from paying the overtime rate for
regular working hours%
-% Iear -9o -2ate "ay
9he program has no control over the amount of year-to-date pay% Any num#er within the limits of
the field will #e accepted and processed%
)hese NOTES TO INSTRUCTOR might help you clarify this assignment to your students. )hey are not
included in the body of the solution because it is intended to be a memo of the students* test data results.
)hey are cross(referenced to the numbered items in the memo.
$% Students will need to know enough a#out EJCE& to recogni'e range names 6SSC&3 K lowest
social security num#er and SSCHI K highest social security num#er7! then ask for @Range Came
Create to find the location of the range% 9hat will lead them to the undisclosed parameter
specification section of the worksheet% 9here they will see the low and high social security
num#ers%
(% Students will need to find the parameter specification section to see the maimum regular pay rate
range name RRA9E! set at E(+ in the program% 9he program has nothing to test for a wage rate
less than E-%(+ 6minimum wage assumed7 or an approved pay rate%
)% Students will need to find the parameter specification section to see the *0 hour limit test for
regular hours worked in the range named RE4% 9here is no sign test to prevent processing of
negative time worked%
M32H-(*
Module H - Information Systems Auditing
H%,* +est Data +ransactions in a Payroll Processing Program ,!ontinued-
*% Students can find the $+0 percent in the range named 39R in the parameter specification section%
9hey will also find the specification for the limit test on overtime hours in the range named 39M%
If students do not find the parameter specification range! their a#ility to find the limit test on
overtime hours depends on whether they entered overtime hours greater than -(%
+% 9he outdated wage limits are easy to find if the student finds the parameter specification section
and sees the incorrect wage limits in the ranges named SSB 6for social security7% 69hese are the
wage limits in effect for (00-%7 9hey are harder to find with test transactions= the student would
have to use a test transaction with earnings-to-date that fall #etween the (00, and (00- limits to
detect the mistaken ta wages limits%
,% Students might identify the issue that overtime pay can #e calculated when regular time is less
than *0 hours #y inference from reading the calculation formula% 3therwise! they will have to have
the imagination to enter regular hours fewer than *0 and overtime hours to see that the program
will produce a paycheck%
-% 9he year-to-date amount is not intended to represent a program deficiency% It is a simplification so
the worksheet will not need to produce some fictitious year-to-date num#er% However! students
may notice that a large unrealistic num#er can #e entered without #eing noticed #y the program%
H%,+ 7aplan !PA E.am Simulation: +e E))ect o) !omputers on te Audit
9wo correct responses appear #elow;
9raditional paper transactions are replaced #y electronic transactions! there#y o#scuring audit trails%
)he abo+e excerpt is from ,lectronic %ommerce.
3R
Source documents may eist only for a short time and in electronic form only%
)he abo+e excerpt is from #ethods of -rocessing and .ata /iles.
M32H-(+
Module H - Information Systems Auditing
H%,, 7aplan !PA E.am Simulation: Internal !ontrol and +ecnology
An upper #oundary esta#lished for processing purposes%
69ransactions over a certain dollar limit re1uire further verification! for
eample%7
limit test ,!-
An internal reconciliation of data within the computer to make certain that it
is legitimate%
6Checks are issued only to actual employees! for eample% 9his could #e
done #y cross-referencing the master employee file%7
validity test ,A-
A total of the num#er of transactions to #e processed% item count ,D-
6record count7
A total derived from some element of the data #eing processed% 9otal would
have some meaning or importance%
69otal sales! for eample%7
#atch total ,E-
A total derived from some element of the data #eing processed that would
not normally #e totaled% 9otal is only computed for control purposes and is
not necessarily meaningful%
69otal of employee social security num#ers! for eample%7
hash total ,&-
M32H-(,

You might also like